Analysis
-
max time kernel
118s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
08/08/2023, 18:04
Static task
static1
Behavioral task
behavioral1
Sample
4bf1d0d32147df349d4318f9b2ce1e0d10d13ad1654f8c7a2c7ffa1332d87251.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
4bf1d0d32147df349d4318f9b2ce1e0d10d13ad1654f8c7a2c7ffa1332d87251.exe
Resource
win10v2004-20230703-en
General
-
Target
4bf1d0d32147df349d4318f9b2ce1e0d10d13ad1654f8c7a2c7ffa1332d87251.exe
-
Size
2.0MB
-
MD5
5848138fd617a6ce6f843f1db252b95f
-
SHA1
6dd2b9bf7b485598dcc3d105cdbcbd428af369a8
-
SHA256
4bf1d0d32147df349d4318f9b2ce1e0d10d13ad1654f8c7a2c7ffa1332d87251
-
SHA512
9175719d21b72633ae07d766ef3908de7d3642e708d883cba4d86ce9a2961bf85e934d784506a0431062be58218fe06e9c947ddbc7f06610640bf6d1fc2e8451
-
SSDEEP
24576:iykmVNRrAQNQWqFbv388ZUq0himkv3PZxyi3RKCHBIZV40Q5WrqcBj:igRxuWK388Z0OPPX3UChGQAj
Malware Config
Signatures
-
Suspicious use of AdjustPrivilegeToken 49 IoCs
description pid Process Token: SeDebugPrivilege 2572 4bf1d0d32147df349d4318f9b2ce1e0d10d13ad1654f8c7a2c7ffa1332d87251.exe Token: 1 2572 4bf1d0d32147df349d4318f9b2ce1e0d10d13ad1654f8c7a2c7ffa1332d87251.exe Token: SeCreateTokenPrivilege 2572 4bf1d0d32147df349d4318f9b2ce1e0d10d13ad1654f8c7a2c7ffa1332d87251.exe Token: SeAssignPrimaryTokenPrivilege 2572 4bf1d0d32147df349d4318f9b2ce1e0d10d13ad1654f8c7a2c7ffa1332d87251.exe Token: SeLockMemoryPrivilege 2572 4bf1d0d32147df349d4318f9b2ce1e0d10d13ad1654f8c7a2c7ffa1332d87251.exe Token: SeIncreaseQuotaPrivilege 2572 4bf1d0d32147df349d4318f9b2ce1e0d10d13ad1654f8c7a2c7ffa1332d87251.exe Token: SeMachineAccountPrivilege 2572 4bf1d0d32147df349d4318f9b2ce1e0d10d13ad1654f8c7a2c7ffa1332d87251.exe Token: SeTcbPrivilege 2572 4bf1d0d32147df349d4318f9b2ce1e0d10d13ad1654f8c7a2c7ffa1332d87251.exe Token: SeSecurityPrivilege 2572 4bf1d0d32147df349d4318f9b2ce1e0d10d13ad1654f8c7a2c7ffa1332d87251.exe Token: SeTakeOwnershipPrivilege 2572 4bf1d0d32147df349d4318f9b2ce1e0d10d13ad1654f8c7a2c7ffa1332d87251.exe Token: SeLoadDriverPrivilege 2572 4bf1d0d32147df349d4318f9b2ce1e0d10d13ad1654f8c7a2c7ffa1332d87251.exe Token: SeSystemProfilePrivilege 2572 4bf1d0d32147df349d4318f9b2ce1e0d10d13ad1654f8c7a2c7ffa1332d87251.exe Token: SeSystemtimePrivilege 2572 4bf1d0d32147df349d4318f9b2ce1e0d10d13ad1654f8c7a2c7ffa1332d87251.exe Token: SeProfSingleProcessPrivilege 2572 4bf1d0d32147df349d4318f9b2ce1e0d10d13ad1654f8c7a2c7ffa1332d87251.exe Token: SeIncBasePriorityPrivilege 2572 4bf1d0d32147df349d4318f9b2ce1e0d10d13ad1654f8c7a2c7ffa1332d87251.exe Token: SeCreatePagefilePrivilege 2572 4bf1d0d32147df349d4318f9b2ce1e0d10d13ad1654f8c7a2c7ffa1332d87251.exe Token: SeCreatePermanentPrivilege 2572 4bf1d0d32147df349d4318f9b2ce1e0d10d13ad1654f8c7a2c7ffa1332d87251.exe Token: SeBackupPrivilege 2572 4bf1d0d32147df349d4318f9b2ce1e0d10d13ad1654f8c7a2c7ffa1332d87251.exe Token: SeRestorePrivilege 2572 4bf1d0d32147df349d4318f9b2ce1e0d10d13ad1654f8c7a2c7ffa1332d87251.exe Token: SeShutdownPrivilege 2572 4bf1d0d32147df349d4318f9b2ce1e0d10d13ad1654f8c7a2c7ffa1332d87251.exe Token: SeDebugPrivilege 2572 4bf1d0d32147df349d4318f9b2ce1e0d10d13ad1654f8c7a2c7ffa1332d87251.exe Token: SeAuditPrivilege 2572 4bf1d0d32147df349d4318f9b2ce1e0d10d13ad1654f8c7a2c7ffa1332d87251.exe Token: SeSystemEnvironmentPrivilege 2572 4bf1d0d32147df349d4318f9b2ce1e0d10d13ad1654f8c7a2c7ffa1332d87251.exe Token: SeChangeNotifyPrivilege 2572 4bf1d0d32147df349d4318f9b2ce1e0d10d13ad1654f8c7a2c7ffa1332d87251.exe Token: SeRemoteShutdownPrivilege 2572 4bf1d0d32147df349d4318f9b2ce1e0d10d13ad1654f8c7a2c7ffa1332d87251.exe Token: SeUndockPrivilege 2572 4bf1d0d32147df349d4318f9b2ce1e0d10d13ad1654f8c7a2c7ffa1332d87251.exe Token: SeSyncAgentPrivilege 2572 4bf1d0d32147df349d4318f9b2ce1e0d10d13ad1654f8c7a2c7ffa1332d87251.exe Token: SeEnableDelegationPrivilege 2572 4bf1d0d32147df349d4318f9b2ce1e0d10d13ad1654f8c7a2c7ffa1332d87251.exe Token: SeManageVolumePrivilege 2572 4bf1d0d32147df349d4318f9b2ce1e0d10d13ad1654f8c7a2c7ffa1332d87251.exe Token: SeImpersonatePrivilege 2572 4bf1d0d32147df349d4318f9b2ce1e0d10d13ad1654f8c7a2c7ffa1332d87251.exe Token: SeCreateGlobalPrivilege 2572 4bf1d0d32147df349d4318f9b2ce1e0d10d13ad1654f8c7a2c7ffa1332d87251.exe Token: 31 2572 4bf1d0d32147df349d4318f9b2ce1e0d10d13ad1654f8c7a2c7ffa1332d87251.exe Token: 32 2572 4bf1d0d32147df349d4318f9b2ce1e0d10d13ad1654f8c7a2c7ffa1332d87251.exe Token: 33 2572 4bf1d0d32147df349d4318f9b2ce1e0d10d13ad1654f8c7a2c7ffa1332d87251.exe Token: 34 2572 4bf1d0d32147df349d4318f9b2ce1e0d10d13ad1654f8c7a2c7ffa1332d87251.exe Token: 35 2572 4bf1d0d32147df349d4318f9b2ce1e0d10d13ad1654f8c7a2c7ffa1332d87251.exe Token: 36 2572 4bf1d0d32147df349d4318f9b2ce1e0d10d13ad1654f8c7a2c7ffa1332d87251.exe Token: 37 2572 4bf1d0d32147df349d4318f9b2ce1e0d10d13ad1654f8c7a2c7ffa1332d87251.exe Token: 38 2572 4bf1d0d32147df349d4318f9b2ce1e0d10d13ad1654f8c7a2c7ffa1332d87251.exe Token: 39 2572 4bf1d0d32147df349d4318f9b2ce1e0d10d13ad1654f8c7a2c7ffa1332d87251.exe Token: 40 2572 4bf1d0d32147df349d4318f9b2ce1e0d10d13ad1654f8c7a2c7ffa1332d87251.exe Token: 41 2572 4bf1d0d32147df349d4318f9b2ce1e0d10d13ad1654f8c7a2c7ffa1332d87251.exe Token: 42 2572 4bf1d0d32147df349d4318f9b2ce1e0d10d13ad1654f8c7a2c7ffa1332d87251.exe Token: 43 2572 4bf1d0d32147df349d4318f9b2ce1e0d10d13ad1654f8c7a2c7ffa1332d87251.exe Token: 44 2572 4bf1d0d32147df349d4318f9b2ce1e0d10d13ad1654f8c7a2c7ffa1332d87251.exe Token: 45 2572 4bf1d0d32147df349d4318f9b2ce1e0d10d13ad1654f8c7a2c7ffa1332d87251.exe Token: 46 2572 4bf1d0d32147df349d4318f9b2ce1e0d10d13ad1654f8c7a2c7ffa1332d87251.exe Token: 47 2572 4bf1d0d32147df349d4318f9b2ce1e0d10d13ad1654f8c7a2c7ffa1332d87251.exe Token: 48 2572 4bf1d0d32147df349d4318f9b2ce1e0d10d13ad1654f8c7a2c7ffa1332d87251.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2572 4bf1d0d32147df349d4318f9b2ce1e0d10d13ad1654f8c7a2c7ffa1332d87251.exe 2572 4bf1d0d32147df349d4318f9b2ce1e0d10d13ad1654f8c7a2c7ffa1332d87251.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4bf1d0d32147df349d4318f9b2ce1e0d10d13ad1654f8c7a2c7ffa1332d87251.exe"C:\Users\Admin\AppData\Local\Temp\4bf1d0d32147df349d4318f9b2ce1e0d10d13ad1654f8c7a2c7ffa1332d87251.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2572